Information system ralph CH09

58 21 0
Information system   ralph CH09

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Fundamentals of Information Systems, Fifth Edition Chapter The Personal and Social Impact of Computers Principles and Learning Objectives • Policies and procedures must be established to avoid computer waste and mistakes – Describe some examples of waste and mistakes in an IS environment, their causes, and possible solutions – Identify policies and procedures useful in eliminating waste and mistakes – Discuss the principles and limits of an individual’s right to privacy Fundamentals of Information Systems, Fifth Edition Principles and Learning Objectives (continued) • Computer crime is a serious and rapidly growing area of concern requiring management attention – Explain the types and effects of computer crime – Identify specific measures to prevent computer crime Fundamentals of Information Systems, Fifth Edition Principles and Learning Objectives (continued) • Jobs, equipment, and working conditions must be designed to avoid negative health effects – List the important effects of computers on the work environment – Identify specific actions that must be taken to ensure the health and safety of employees Fundamentals of Information Systems, Fifth Edition Principles and Learning Objectives (continued) • Practitioners in many professions subscribe to a code of ethics that states the principles and core values that are essential to their work – Outline criteria for the ethical use of information systems Fundamentals of Information Systems, Fifth Edition Computer Waste and Mistakes • Computer waste – Inappropriate use of computer technology and resources • Computer-related mistakes – Errors, failures, and other computer problems that make computer output incorrect or not useful Fundamentals of Information Systems, Fifth Edition Computer Waste • Discarding old software and even complete computer systems when they still have value • Building and maintaining complex systems that are never used to their fullest extent • Using corporate time and technology for personal use • Spam Fundamentals of Information Systems, Fifth Edition Computer-Related Mistakes • Causes – – – – Failure by users to follow proper procedures Unclear expectations and a lack of feedback Program development that contains errors Incorrect data entry by data-entry clerk Fundamentals of Information Systems, Fifth Edition Preventing Computer-Related Waste and Mistakes • Preventing waste and mistakes involves: – – – – Establishing policies and procedures Implementing policies and procedures Monitoring policies and procedures Reviewing policies and procedures Fundamentals of Information Systems, Fifth Edition Implementing Policies and Procedures • Establish policies and procedures regarding efficient acquisition, use, and disposal of systems and devices • Training programs for individuals and workgroups • Manuals and documents on how computer systems are to be maintained and used • Approval of certain systems and applications to ensure compatibility and cost-effectiveness Fundamentals of Information Systems, Fifth Edition 10 Instant Messaging Privacy • Using instant messaging (IM) to send and receive messages, files, and images – Introduces the same privacy issues associated with e-mail • Do not send personal or private IMs at work Fundamentals of Information Systems, Fifth Edition 44 Privacy and Personal Sensing Devices • RFID tags – Essentially microchips with antenna, are embedded in many of the products we buy – Generate radio transmissions that, if appropriate measures are not taken, can lead to potential privacy concerns Fundamentals of Information Systems, Fifth Edition 45 Privacy and the Internet • Platform for Privacy Preferences (P3P) – Screening technology that shields users from Web sites that not provide the level of privacy protection they desire • Children’s Online Privacy Protection Act (COPPA), 1998 – Require privacy policies and parental consent Fundamentals of Information Systems, Fifth Edition 46 Fairness in Information Use • Laws passed regarding a person’s right to privacy – – – – The Privacy Act of 1974 Gramm-Leach-Bliley Act USA Patriot Act Other Federal Privacy Laws Fundamentals of Information Systems, Fifth Edition 47 Fundamentals of Information Systems, Fifth Edition 48 Fundamentals of Information Systems, Fifth Edition 49 Corporate Privacy Policies • Invasions of privacy – Can hurt business, turn away customers, and dramatically reduce revenues and profits • Multinational companies – Face an extremely difficult challenge in implementing data collection and dissemination processes and policies Fundamentals of Information Systems, Fifth Edition 50 Individual Efforts to Protect Privacy • Find out what is stored about you in existing databases • Be careful when you share information about yourself • Be proactive to protect your privacy • When purchasing anything from a Web site, make sure that you safeguard your credit card numbers, passwords, and personal information Fundamentals of Information Systems, Fifth Edition 51 The Work Environment • Computer technology and information systems – Have opened up numerous avenues to professionals and nonprofessionals • Despite increases in productivity and efficiency – Computers and information systems can raise other concerns Fundamentals of Information Systems, Fifth Edition 52 Health Concerns • Working with computers – Can cause occupational stress • Training and counseling – Can often help the employee and deter problems • Carpal tunnel syndrome (CTS) – Aggravation of the pathway for the nerves that travel through the wrist (carpal tunnel) Fundamentals of Information Systems, Fifth Edition 53 Avoiding Health and Environmental Problems • Many computer-related health problems – Are caused by a poorly designed work environment • Ergonomics – Science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them Fundamentals of Information Systems, Fifth Edition 54 Ethical Issues in Information Systems • Code of ethics – States the principles and core values that are essential to a set of people and thus governs their behavior Fundamentals of Information Systems, Fifth Edition 55 Summary • Computer waste – Inappropriate use of computer technology and resources in both the public and private sectors • Some crimes use computers as tools • Computer crimes target computer systems and include: – Illegal access to computer systems by criminal hackers – Alteration and destruction of data and programs by viruses – Theft of computer resources Fundamentals of Information Systems, Fifth Edition 56 Summary (continued) • Because of increased computer use – Greater emphasis is placed on the prevention and detection of computer crime • Although most companies use data files for legitimate, justifiable purposes – Opportunities for invasion of privacy abound • A business should: – Develop a clear and thorough policy about privacy rights for customers, including database access Fundamentals of Information Systems, Fifth Edition 57 Summary (continued) • Computers have: – Changed the makeup of the workforce and even eliminated some jobs – Expanded and enriched employment opportunities in many ways • Ethics – Determine generally accepted and discouraged activities within a company and society at large Fundamentals of Information Systems, Fifth Edition 58 ... cans of an organization to find confidential information, including information needed to access an information system Fundamentals of Information Systems, Fifth Edition 15 Cyberterrorism • Cyberterrorist... Federal Privacy Laws Fundamentals of Information Systems, Fifth Edition 47 Fundamentals of Information Systems, Fifth Edition 48 Fundamentals of Information Systems, Fifth Edition 49 Corporate... trails on Fundamentals of Information Systems, Fifth Edition 31 Fundamentals of Information Systems, Fifth Edition 32 Using Intrusion Detection Software • Monitors system and network resources

Ngày đăng: 17/09/2020, 14:54

Từ khóa liên quan

Mục lục

  • Fundamentals of Information Systems, Fifth Edition

  • Principles and Learning Objectives

  • Principles and Learning Objectives (continued)

  • Slide 4

  • Slide 5

  • Computer Waste and Mistakes

  • Computer Waste

  • Computer-Related Mistakes

  • Preventing Computer-Related Waste and Mistakes

  • Implementing Policies and Procedures

  • Slide 11

  • Monitoring Policies and Procedures

  • Reviewing Policies and Procedures

  • Computer Crime

  • The Computer as a Tool to Commit Crime

  • Cyberterrorism

  • Identity Theft

  • Internet Gambling

  • The Computer as the Object of Crime

  • Illegal Access and Use

  • Illegal Access and Use (continued)

  • Using Antivirus Programs

  • Spyware

  • Information and Equipment Theft

  • Safe Disposal of Personal Computers

  • Patent and Copyright Violations

  • Computer-Related Scams

  • International Computer Crime

  • Preventing Computer-Related Crime

  • Crime Prevention by State and Federal Agencies

  • Crime Prevention by Corporations

  • Slide 32

  • Using Intrusion Detection Software

  • Security Dashboard

  • Using Managed Security Service Providers (MSSPs)

  • Filtering and Classifying Internet Content

  • Internet Libel Concerns

  • Preventing Crime on the Internet

  • Preventing Crime on the Internet (continued)

  • Privacy Issues

  • Privacy and the Federal Government

  • Privacy at Work

  • E-Mail Privacy

  • Instant Messaging Privacy

  • Privacy and Personal Sensing Devices

  • Privacy and the Internet

  • Fairness in Information Use

  • Slide 48

  • Slide 49

  • Corporate Privacy Policies

  • Individual Efforts to Protect Privacy

  • The Work Environment

  • Health Concerns

  • Avoiding Health and Environmental Problems

  • Ethical Issues in Information Systems

  • Summary

  • Summary (continued)

  • Slide 58

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan